There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
{ "binaries": [ { "binary_name": "libapache-jena-java", "binary_version": "3.17.0-3" } ] }
{ "binaries": [ { "binary_name": "libapache-jena-java", "binary_version": "4.9.0-1" } ] }